Preparation
Attacks: Side-Channel
-
Resource Shared: Hardware
-
Timing Channels, stories of Multics (1 page)
-
Microarchitectural Timing Attacks, Sections 1, 2 and 4 (10 pages)
-
Microarchitectural Attack: Rowhammer (3 pages)
-
-
Resource Shared: Network
-
Blind SQL Injection (3 pages)
-
Timing Analysis of Keystrokes (and SSH), by Song et al., up-to-and-including Section 2 (3 pages)
-
Traffic Analysis, slides by Rafnsson (4 pages of text)
-
-
Resource Shared: Physical World ("airgap" attacks)
-
Light, Sound, Electromagnetic Radiation [Paywall; B] (2 pages)
-
Vibrations (2 pages)
-
Power Usage (on the circuit), Section 2 (2 pages)
-
Power Usage (inside a chip), Chapter 5, up to but not including Section 5.1 (2 pages)
-
Attacks: Social Engineering
-
The Psychology that Phishers Use to Try and Fool Us (2 pages)
-
Social Engineering Attacks, pages 1-7 (7 pages)
Exercise
Further Reading
-
Microarchitectural Attack: Flush + Reload, at Black Hat (23:48)
-
Microarchitectural Attack: Meltdown & Spectre, by Ymir Vigfusson (16:08)
-
Microarchitectural Attack: Rowhammer, by Ymir Vigfusson (18:48)
-
Reading smartphone unlock pattern by using speakers + mic as a sonar (3 pages)
-
Hacking Smart Cards (1:11)
-
gone, here is a news article instead
-
-
Science of Persuasion (11:50)
-
I’ll Let Myself In, clip (2:22)